Displaying 14 results from an estimated 14 matches for "luksuuid".
2017 Jun 20
2
CentOS 6 and luksOpen
...point in the future,
>> go to CentOS 7, but that needs my user to be off for a while, and his jobs
>> run literally for weeks, with loads upwords of 30 on an HBS (honkin' big
>> server)....
>
> MAPDEVICE=/dev/sdxy ; cryptsetup luksOpen ${MAPDEVICE} luks-$(cryptsetup
> luksUUID ${MAPDEVICE})
Something's not right. I did
cryptsetup luksOpen /dev/sdb luks-$(cryptsetup luksUUID $(/dev/sdb))
--key-file /etc/crypt.pw
It did want the password, so I added --key-file, but it seems to have
created /dev/mapper/luks, not the full luksUUID that's in both crypttab
and fstab....
2017 Jun 20
2
CentOS 6 and luksOpen
Upgraded a RAID. Copied everything from backup.
And then my manager said I had to encrypt the drive.
I've done that, and made the filesystem, but I can't mount it.
CentOS 6.
I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the
luks UUID in /etc/fstab. I cannot find the command that tells it to create
the device in /dev/mapper from the info in /etc/crypttab.
Clues for
2020 Oct 06
2
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...gt;For BitLocker disks cryptsetup does not (yet? ever?) support reading
>UUIDs and this function will fail. This does not matter here so just
>ignore the error.
>
>Note there is no error message, cryptsetup simply returns with a bad
>exit code:
>
>><rescue> cryptsetup luksUUID /dev/sda2
>><rescue> echo $?
>1
>
>Updates commit bb4a2dc17a78b53437896d4215ae82df8e11b788.
>---
> options/decrypt.c | 15 ++++++++++++++-
> 1 file changed, 14 insertions(+), 1 deletion(-)
>
>diff --git a/options/decrypt.c b/options/decrypt.c
>index 8eb24bc..6b...
2020 Oct 07
2
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...reading
>> >UUIDs and this function will fail. This does not matter here so just
>> >ignore the error.
>> >
>> >Note there is no error message, cryptsetup simply returns with a bad
>> >exit code:
>> >
>> >><rescue> cryptsetup luksUUID /dev/sda2
>> >><rescue> echo $?
>> >1
>> >
>> >Updates commit bb4a2dc17a78b53437896d4215ae82df8e11b788.
>> >---
>> >options/decrypt.c | 15 ++++++++++++++-
>> >1 file changed, 14 insertions(+), 1 deletion(-)
>> >
>&g...
2020 Sep 07
5
[PATCH common v2 0/4] Windows BitLocker support.
...The original feedback was that ignoring errors from guestfs_luks_uuid
would ignore legitimate errors from non-BitLocker disks, so I have
modified this series so that errors are only ignored in the BitLocker
case. As noted in the 4th patch there is no actual error in the
BitLocker case, cryptsetup luksUUID simply exits without printing
anything.
Rich.
2017 Jun 20
0
CentOS 6 and luksOpen
...>> go to CentOS 7, but that needs my user to be off for a while, and his jobs
>>> run literally for weeks, with loads upwords of 30 on an HBS (honkin' big
>>> server)....
>>
>> MAPDEVICE=/dev/sdxy ; cryptsetup luksOpen ${MAPDEVICE} luks-$(cryptsetup
>> luksUUID ${MAPDEVICE})
>
> Something's not right. I did
> cryptsetup luksOpen /dev/sdb luks-$(cryptsetup luksUUID $(/dev/sdb))
> --key-file /etc/crypt.pw
>
> It did want the password, so I added --key-file, but it seems to have
> created /dev/mapper/luks, not the full luksUUID tha...
2020 Oct 06
0
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...oes not (yet? ever?) support reading
> >UUIDs and this function will fail. This does not matter here so just
> >ignore the error.
> >
> >Note there is no error message, cryptsetup simply returns with a bad
> >exit code:
> >
> >><rescue> cryptsetup luksUUID /dev/sda2
> >><rescue> echo $?
> >1
> >
> >Updates commit bb4a2dc17a78b53437896d4215ae82df8e11b788.
> >---
> >options/decrypt.c | 15 ++++++++++++++-
> >1 file changed, 14 insertions(+), 1 deletion(-)
> >
> >diff --git a/options/decrypt....
2020 Oct 09
0
Re: [PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
...IDs and this function will fail. This does not matter here so just
>>> >ignore the error.
>>> >
>>> >Note there is no error message, cryptsetup simply returns with a bad
>>> >exit code:
>>> >
>>> >><rescue> cryptsetup luksUUID /dev/sda2
>>> >><rescue> echo $?
>>> >1
>>> >
>>> >Updates commit bb4a2dc17a78b53437896d4215ae82df8e11b788.
>>> >---
>>> >options/decrypt.c | 15 ++++++++++++++-
>>> >1 file changed, 14 insertions(+), 1 dele...
2020 Sep 07
0
[PATCH common v2 4/4] options: Ignore errors from guestfs_luks_uuid.
For BitLocker disks cryptsetup does not (yet? ever?) support reading
UUIDs and this function will fail. This does not matter here so just
ignore the error.
Note there is no error message, cryptsetup simply returns with a bad
exit code:
><rescue> cryptsetup luksUUID /dev/sda2
><rescue> echo $?
1
Updates commit bb4a2dc17a78b53437896d4215ae82df8e11b788.
---
options/decrypt.c | 15 ++++++++++++++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/options/decrypt.c b/options/decrypt.c
index 8eb24bc..6b1c0a8 100644
--- a/options/decrypt.c
+++...
2015 Feb 10
1
LUKS on EL6 / enable block device after reboot
...on that was not enabled while booting,
because not in the crypttab).
I can execute the necessary command stack [1] but just wondering if
there is an "enterprise/easy" way to do that ...
[1] cryptsetup luksOpen $(blkid -t TYPE="crypto_LUKS" -o device) \
luks-$(cryptsetup luksUUID $(blkid -t TYPE="crypto_LUKS" -o device))
--
LF
2017 Jun 20
0
CentOS 6 and luksOpen
...the server will, at some point in the future, go
> to CentOS 7, but that needs my user to be off for a while, and his jobs
> run literally for weeks, with loads upwords of 30 on an HBS (honkin' big
> server)....
MAPDEVICE=/dev/sdxy ; cryptsetup luksOpen ${MAPDEVICE} luks-$(cryptsetup luksUUID ${MAPDEVICE})
MAPDEVICE=/dev/sdxy ; mount /dev/mapper/luks-$(cryptsetup luksUUID ${MAPDEVICE}) /mnt
--
LF
2019 Nov 29
0
[PATCH 1/1] New API: luks_uuid
...+++ b/daemon/luks.c
@@ -292,3 +292,28 @@ do_luks_kill_slot (const char *device, const char *key, int keyslot)
return 0;
}
+
+char *
+do_luks_uuid (const char *device)
+{
+ const char *argv[MAX_ARGS];
+ size_t i = 0;
+
+ ADD_ARG (argv, i, "cryptsetup");
+ ADD_ARG (argv, i, "luksUUID");
+ ADD_ARG (argv, i, device);
+ ADD_ARG (argv, i, NULL);
+
+ char *out = NULL;
+ CLEANUP_FREE char *err = NULL;
+ int r = commandv (&out, &err, (const char * const *) argv);
+
+ if (r == -1) {
+ reply_with_error ("%s", err);
+ return NULL;
+ }
+
+ trim (out);...
2017 Jun 22
1
CentOS 6 and crypttab
Folks,
I have an issue: I've gotten that drive that I posted about the other
day encrypted, and things were looking good... until there was a
problem with another RAID attached to the box, and I wound up having to
reboot.
What had been /dev/sdb came up as /dev/sdc. So... is there any way
other than using /dev/disk/by-uuid/<uUUID> as the second field in
/etc/crypttab to deal with
2019 Nov 29
8
[PATCH 0/1] Allow UUIDs for --key identifiers.
This combined patch series enables to decrypt LUKS devices on inspection
by allowing the UUID of the LUKS device with the --key syntax.
I opted for reusing the option instead of adding another one, as I think
that device names and UUIDs are different enough that can be properly
distinguished.
A test for this (patch #4) can be applied only when the patches for
common are applied, and the